8
Gartner Security & Risk Management Summit 2015 14 – 15 September | London, UK | gartner.com/eu/security Five Programs • Chief Information Security Officer (CISO) • Risk Management and Compliance • Security Manager Program: Technology, Trends and Operations • Business Continuity Management • Internet of Things Security The World’s Most Important Gathering for Security and Risk Executives EARLY-BIRD DISCOUNT Save €325 by 17 July

Gartner Security & Risk Management Summit 2015 · #gartnersecurity Gartner Security & Risk Management Summit 2015 Reevaluate your security and risk strategies and investments for

  • Upload
    vokhue

  • View
    228

  • Download
    1

Embed Size (px)

Citation preview

Gartner Security & Risk Management Summit 201514 – 15 September | London, UK | gartner.com/eu/security

Five Programs

• ChiefInformationSecurityOfficer(CISO)

• RiskManagementandCompliance

• SecurityManagerProgram:Technology,TrendsandOperations

• BusinessContinuityManagement

• InternetofThingsSecurity

TheWorld’sMostImportantGatheringforSecurityandRiskExecutives

EARLY-BIRD DIscount save €325 by 17 July

Visit gartner.com/eu/security for more information

Manage Risk and Deliver Security in a Digital World Craft your strategy for business resiliency

GetthetoolsyouneedtodeliversecuredigitalbusinessenvironmentsandensureyourorganizationcanweatheranattackordisruptionandbouncebackquicklyatGartner Security & Risk Management Summit 2015, 14 – 15 September, London, UK.Thisyear’sconferencecoversthebreadthofprioritiesinITsecurity,riskmanagement,governance,compliance,BCM,theroleoftheCISO,thebusinessofsecurity,privacy,IAMandmore.

JoinusthisSeptembertofindouthowyoucanadvanceyoursecurityandriskgoalstosupportbusinessobjectivesandimproveresilienceacrosstheorganization.

Key benefits of attending

•Gaintoolsandstrategiestostayaheadofyournewresponsibilitiesandincreasingthreats

•Alignsecurityandriskstrategieswithyourenterpriseobjectivesanddigitaltransformation

•Assurecompliancewithnewregulatory,compliance,privacyande-discoveryrequirements

•Applythelatesttechniquestotacklerisksincloud,OTandIoT

•Buildaculturethatdrivessecurityperformancethroughemployeeengagement

Who will be there?

•ChiefInformationSecurityOfficers

•ChiefRiskOfficers

•ChiefInformationOfficers

•ITVicePresidents/Directors

•ITSecurityOfficers/Directors

•Risk,ComplianceandPrivacyManagers

•InformationSecurity/RiskManagers

•Network,Infrastructure,SolutionsandSecurityArchitects

Gartner Security & Risk Management Summit 2015#gartnersecurity

Reevaluate your security and risk strategies and investments for the digital age

DigitalbusinesstechnologiesandtheInternetofThingsarecreatingnewthreatsandrisksevenasregulatorycomplianceandlegalriskscontinuetoescalate,andsophisticatedcyberthreatschallengeeventhebestsecuritystrategies.Everybusinessisnowadigitalbusiness,andeverybusinessmustbecomeproficientatriskassessmentandmitigation,thefoundationofsuccessinthedigitalage.

Thisyear’ssummitdeliversthelatestresearchandrecommendationsacrosssecurityandriskmanagementpriorities,andprovidesyouwithsolutionstothelatesthottopics,including:

•Application,networkandinfrastructuresecurity

•Cloudsecurity

•Mobilesecurity

•Cybersecurity

•Digitalbusinesssecurityandriskmanagement

•Operationaltechnology(OT)securityandriskmanagement

•OrganizationalresiliencethroughBCM

•Riskmanagementandcompliance

•SecurityAwarenessandTraining

TheintersectionofIT,operationaltechnologyandtheInternetofThingsisspawninganewgenerationofthreats.Joinusforthelateststrategiestohelpyouanticipaterisk,mitigateitsimpactandenablesuccessfulbusinessoutcomes.

What’s new for 2015•Revampedagendafeaturingnewcontent,andcoveringkeychallengessuchasapplications,networkandmobilesecurity;securityforthecloud;digitalbusinesssecurity,riskmanagementandprivacyandEUregulations

•FirsteverpresentationofMagicQuadrantforoperationalriskmanagement

•Industry-orientatedcontent,especiallyaroundfinancialservices,bankingandinsurance

•Focusedsessionsoncrisisandincidentmanagement

•Contenttailoredforsmallandmediumbusinesses

•Expandedopportunitytonetworkwithyourpeerswithnetworkinglunchesanddrinksreceptionsavailable

Gartner Security & Risk Management Summit 2015

AgendaataGlance

#gartnersecurity

Mo

nday

14 S

ep

te

mb

er

201

5Tu

esd

ay15

Se

pt

em

be

r 2

015

07:30–20:00 RegistrationandInformation

08:00–08:45 Tutorial:TopTrendsandTakewaysforCybersecurity Earl Perkins Tutorial:BestPracticesinCrisisCommunications Roberta Witty

09:00–10:00 Summit Chair Welcome and Gartner Keynote: manage risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle

10:00–10:30 IndustryPanel

10:30–11:00 RefreshmentBreakintheSolutionShowcase 10:35 – 10:55 MagicQuadrantforSecurityInformationandEventManagement Oliver Rochford

11:00–12:00 Guest Keynote tobeconfirmedshortly

12:00–13:15 LunchintheSolutionShowcase 12:15 – 12:35 MagicQuadrantforOperationalRiskManagement John Wheeler

TRAcks A. chief Information security Officer (cIsO) Program

B. Risk Management and compliance Program

c. security Manager Program: Technology, Trends and Operations D. Business continuity Management Program and

E. Internet of Things security Program

Workshops and contract Negotiation clinics

Roundtables

13:15–14:00 TheNewCISO'sCrucialFirst100Days Tom scholtz

APublicCloudRiskModel:AcceptingCloudRiskisOK,IgnoringCloudRiskisTragic Paul Proctor

DefensiveStrategiesinanAgeofDigitalInsurgency Oliver Rochford

Gartner'sAdaptiveSecurityArchitecture:NewApproachesforAdvancedandInsiderThreatsNeil MacDonald

TheAvailabilityImplicationsforDigitalBusiness Roberta Witty

12:45 – 14:15 Workshop:GetIncident-Ready.TestYourPlanwithaScenario Rob McMillan

13:15 – 14:15 Roundtable:ReduceTheRisksandImplementDataAccessControlsNow!Brian Lowans

14:15–14:45 SolutionProviderSessions14:30 – 16:00 Workshop:GetSecurityRightinanSMBEnvironment Rob McMillan

14:45–15:15 RefreshmentBreakintheSolutionShowcase

15:15–16:00 BeAgileNotFragile:UseThreatIntelligenceServicestoDefendYourself Rob McMillan

ThePathtoHighImpactSecurityAwareness christian Byrnes

MobileSecurityThreatsandTrends2015 Dionisio Zumerle

SecuringSensitiveSaaSUsingCloudAccessSecurityBrokers Ramon krikken

CaseStudy 15:15 – 16:15 Roundtable:ChangingYourSecurityCulture:WhyChangeisHardandWhattoDoAboutIt Debra Logan

16:15–16:45 SolutionProviderSessions 16:15 – 17:45 Workshop:SecureSelf-AssessingandSelf-CleansingSystemswithDevOps?Joerg Fritsch

16:30 – 17:30 Roundtable:ManagingtheIdentityofThingsAnt Allan

17:00–17:30 ProtectingYourHouseonthePrairie:SecurityStrategyfortheSmallerEnterprise Tom scholtz

IncidentResponsePlatforms—ALongTimeComing Rob McMillan

YourCloudServiceAdoptionStrategyMustIncludeDataProtection Brian Lowans

TheDarkSideofPaymentCardSecurity Jonathan care

WhyCrisisManagementistheHeartofBCMSoftware Roberta Witty

17:30–20:00 NetworkingReceptionintheSolutionShowcase

07:45–17:15 RegistrationandInformation

08:00–08:45 People-CentricSecurity:ExperiencesandLessonsLearnt Tom scholtz

HowtoGetSingleSignOn Ant Allan DefendingEndpointsfromthePersistentAttack Peter Firstbrook

PrivacyandtheInternetofThings:HowtoAvoidCrossingtheCreepyLine carsten casper

08:00 – 09:30 ContractNegotiatingClinic:CloudContracts,DevelopYourOwnSecurityandRiskExhibits Gayla sullivan

08:00 – 09:00 Roundtable:DoyouMeasuretheImpactofYourAwarenessProgram? christian Byrnes

09:00–09:45 CaseStudy What'sNewandHotinGRC? John Wheeler FutureofEndpointManagement Rob smith DefendingAgainstSophisticatedMalware Mario de Boer

BalancingTrustandUserExperienceforUserAuthentication Ant Allan

09:45–10:15 RefreshmentBreakintheSolutionShowcase

10:15–10:45 SolutionProviderSessions

11:00–11:45 CaseStudy UseaVendorRiskManagementFrameworktoMitigateRegulatory,Compliance,SecurityandPerformanceIssues Gayla sullivan

Panel:MobileSecurityandManagement:ARealWorldDiscussion Rob smith et al.

DesigningtheModernApplicationSecurityPerimeter—WithMobileandCloudinMind Ramon krikken

CybersecurityPanel:ITSecurity,OTSecurity,IoTSecurity:ImpactsandRecommendations Earl Perkins et al.

10:45 – 12:15 Workshop:IntroductiontoMobileSecuritySelf-Assessments John Girard and Dionisio Zumerle

10:45 – 11:45 Roundtable:BuildingSuccessfulBusinessMetricsforTechnologyRiskPaul Proctor

11:45–13:00 LunchintheSolutionShowcase 12:30 – 12:50 MagicQuadrantforEnterpriseNetworkFirewalls Jeremy D’Hoinne

13:00–13:45 AvoidFiveSecurityStaffingDisasters Jeremy D’Hoinne

DigitalBusinessandYourNewRelationshipwithRisk Paul Proctor

WhatRoleWillVPNsPlayinYourBusinessFuture? John Girard

SecureUseofAWSandAzure:ComparisonandBestPractices Neil MacDonald

OperationalTechnologySecurityisNotJustforIndustriesAnymore Earl Perkins

13:00 – 14:30 Workshop:IdentityProofingRevisitedasDataPrivacyDies Jonathan care

13:00 – 14:00 Roundtable:WhySocialMediaRisksAreSkyrocketingandWhatYouCanDotoProtectYourCompany John Wheeler

14:00–14:30 ChiefDataOfficersandChiefInformationSecurityOfficers:FriendsorFoes? Debra Logan

WhatCanWeExpectfromtheUpcomingEUDataProtectionRegulation? carsten casper

LessonsLearnedonAdvancedThreatDefenseStrategiesandTools Jeremy D’Hoinne

ProtectingMobileAppsDionisio Zumerle

CaseStudy

14:30–15:00 RefreshmentBreakintheSolutionShowcase14:45 – 16:15 Workshop:ReportingRiskandSecuritytoyourBoardofDirectors Paul Proctor

15:00–15:30 CaseStudy HowToBuildAGloballyLegalandSuccessfulBYODProgram John Girard

FriendsattheGate?BestPracticesforEnablingRemotePrivilegedAccessFromVendorsandThirdParties Felix Gaehtgens

TheLegalityandEthicsofIoTandEmployeeMonitoring TBD

15:00 – 16:00 Roundtable:SecureUseofPublicCloudNeil MacDonald

15:45–16:15 OneSimpleWaytoGetYourCEOtoEmbraceRiskManagement John Wheeler

AssessingCloudServiceProviders:GettingBeyondtheChecklistsErik Heidt

WhatYourContainersdoNotContain!AbouttheSecurityPropertiesofContainersManagedbyDocker Joerg Fritsch

WomeninSecurityandRiskManagement:DoWomenApproachSecurityandRiskManagementDifferentlyThanMen? Roberta Witty

16:30–17:15 Gartner Closing Keynote and Summit Chair Closing remarks: Cybersecurity Scenario 2020: the Impact of Digital business on Security Neil MacDonald

Visit gartner.com/eu/security for more information

Agenda as of 19 June 2015

During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information.

07:30–20:00 RegistrationandInformation

08:00–08:45 Tutorial:TopTrendsandTakewaysforCybersecurity Earl Perkins Tutorial:BestPracticesinCrisisCommunications Roberta Witty

09:00–10:00 Summit Chair Welcome and Gartner Keynote: manage risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle

10:00–10:30 IndustryPanel

10:30–11:00 RefreshmentBreakintheSolutionShowcase 10:35 – 10:55 MagicQuadrantforSecurityInformationandEventManagement Oliver Rochford

11:00–12:00 Guest Keynote tobeconfirmedshortly

12:00–13:15 LunchintheSolutionShowcase 12:15 – 12:35 MagicQuadrantforOperationalRiskManagement John Wheeler

TRAcks A. chief Information security Officer (cIsO) Program

B. Risk Management and compliance Program

c. security Manager Program: Technology, Trends and Operations D. Business continuity Management Program and

E. Internet of Things security Program

Workshops and contract Negotiation clinics

Roundtables

13:15–14:00 TheNewCISO'sCrucialFirst100Days Tom scholtz

APublicCloudRiskModel:AcceptingCloudRiskisOK,IgnoringCloudRiskisTragic Paul Proctor

DefensiveStrategiesinanAgeofDigitalInsurgency Oliver Rochford

Gartner'sAdaptiveSecurityArchitecture:NewApproachesforAdvancedandInsiderThreatsNeil MacDonald

TheAvailabilityImplicationsforDigitalBusiness Roberta Witty

12:45 – 14:15 Workshop:GetIncident-Ready.TestYourPlanwithaScenario Rob McMillan

13:15 – 14:15 Roundtable:ReduceTheRisksandImplementDataAccessControlsNow!Brian Lowans

14:15–14:45 SolutionProviderSessions14:30 – 16:00 Workshop:GetSecurityRightinanSMBEnvironment Rob McMillan

14:45–15:15 RefreshmentBreakintheSolutionShowcase

15:15–16:00 BeAgileNotFragile:UseThreatIntelligenceServicestoDefendYourself Rob McMillan

ThePathtoHighImpactSecurityAwareness christian Byrnes

MobileSecurityThreatsandTrends2015 Dionisio Zumerle

SecuringSensitiveSaaSUsingCloudAccessSecurityBrokers Ramon krikken

CaseStudy 15:15 – 16:15 Roundtable:ChangingYourSecurityCulture:WhyChangeisHardandWhattoDoAboutIt Debra Logan

16:15–16:45 SolutionProviderSessions 16:15 – 17:45 Workshop:SecureSelf-AssessingandSelf-CleansingSystemswithDevOps?Joerg Fritsch

16:30 – 17:30 Roundtable:ManagingtheIdentityofThingsAnt Allan

17:00–17:30 ProtectingYourHouseonthePrairie:SecurityStrategyfortheSmallerEnterprise Tom scholtz

IncidentResponsePlatforms—ALongTimeComing Rob McMillan

YourCloudServiceAdoptionStrategyMustIncludeDataProtection Brian Lowans

TheDarkSideofPaymentCardSecurity Jonathan care

WhyCrisisManagementistheHeartofBCMSoftware Roberta Witty

17:30–20:00 NetworkingReceptionintheSolutionShowcase

07:45–17:15 RegistrationandInformation

08:00–08:45 People-CentricSecurity:ExperiencesandLessonsLearnt Tom scholtz

HowtoGetSingleSignOn Ant Allan DefendingEndpointsfromthePersistentAttack Peter Firstbrook

PrivacyandtheInternetofThings:HowtoAvoidCrossingtheCreepyLine carsten casper

08:00 – 09:30 ContractNegotiatingClinic:CloudContracts,DevelopYourOwnSecurityandRiskExhibits Gayla sullivan

08:00 – 09:00 Roundtable:DoyouMeasuretheImpactofYourAwarenessProgram? christian Byrnes

09:00–09:45 CaseStudy What'sNewandHotinGRC? John Wheeler FutureofEndpointManagement Rob smith DefendingAgainstSophisticatedMalware Mario de Boer

BalancingTrustandUserExperienceforUserAuthentication Ant Allan

09:45–10:15 RefreshmentBreakintheSolutionShowcase

10:15–10:45 SolutionProviderSessions

11:00–11:45 CaseStudy UseaVendorRiskManagementFrameworktoMitigateRegulatory,Compliance,SecurityandPerformanceIssues Gayla sullivan

Panel:MobileSecurityandManagement:ARealWorldDiscussion Rob smith et al.

DesigningtheModernApplicationSecurityPerimeter—WithMobileandCloudinMind Ramon krikken

CybersecurityPanel:ITSecurity,OTSecurity,IoTSecurity:ImpactsandRecommendations Earl Perkins et al.

10:45 – 12:15 Workshop:IntroductiontoMobileSecuritySelf-Assessments John Girard and Dionisio Zumerle

10:45 – 11:45 Roundtable:BuildingSuccessfulBusinessMetricsforTechnologyRiskPaul Proctor

11:45–13:00 LunchintheSolutionShowcase 12:30 – 12:50 MagicQuadrantforEnterpriseNetworkFirewalls Jeremy D’Hoinne

13:00–13:45 AvoidFiveSecurityStaffingDisasters Jeremy D’Hoinne

DigitalBusinessandYourNewRelationshipwithRisk Paul Proctor

WhatRoleWillVPNsPlayinYourBusinessFuture? John Girard

SecureUseofAWSandAzure:ComparisonandBestPractices Neil MacDonald

OperationalTechnologySecurityisNotJustforIndustriesAnymore Earl Perkins

13:00 – 14:30 Workshop:IdentityProofingRevisitedasDataPrivacyDies Jonathan care

13:00 – 14:00 Roundtable:WhySocialMediaRisksAreSkyrocketingandWhatYouCanDotoProtectYourCompany John Wheeler

14:00–14:30 ChiefDataOfficersandChiefInformationSecurityOfficers:FriendsorFoes? Debra Logan

WhatCanWeExpectfromtheUpcomingEUDataProtectionRegulation? carsten casper

LessonsLearnedonAdvancedThreatDefenseStrategiesandTools Jeremy D’Hoinne

ProtectingMobileAppsDionisio Zumerle

CaseStudy

14:30–15:00 RefreshmentBreakintheSolutionShowcase14:45 – 16:15 Workshop:ReportingRiskandSecuritytoyourBoardofDirectors Paul Proctor

15:00–15:30 CaseStudy HowToBuildAGloballyLegalandSuccessfulBYODProgram John Girard

FriendsattheGate?BestPracticesforEnablingRemotePrivilegedAccessFromVendorsandThirdParties Felix Gaehtgens

TheLegalityandEthicsofIoTandEmployeeMonitoring TBD

15:00 – 16:00 Roundtable:SecureUseofPublicCloudNeil MacDonald

15:45–16:15 OneSimpleWaytoGetYourCEOtoEmbraceRiskManagement John Wheeler

AssessingCloudServiceProviders:GettingBeyondtheChecklistsErik Heidt

WhatYourContainersdoNotContain!AbouttheSecurityPropertiesofContainersManagedbyDocker Joerg Fritsch

WomeninSecurityandRiskManagement:DoWomenApproachSecurityandRiskManagementDifferentlyThanMen? Roberta Witty

16:30–17:15 Gartner Closing Keynote and Summit Chair Closing remarks: Cybersecurity Scenario 2020: the Impact of Digital business on Security Neil MacDonald

Gartner Security & Risk Management Summit 2015 #gartnersecurity

Forfurtherinformationaboutsponsoringthisevent:

Telephone: +441784267456

Email: [email protected]

Sponsorship Opportunities

SolutionShowcase

Premier Sponsor

Platinum Sponsors

Developa“shortlist”oftechnologyandserviceproviderswhocanmeetyourparticularneeds.Weofferyouexclusiveaccesstosomeoftheworld’sleadingtechnologyandservicesolutionprovidersinavarietyofsettings.

As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security. Our security is powered by Trend Micro™ Smart Protection Network™ global threat intelligence and is supported by over 1,200 security experts around the world.

www.trendmicro.co.uk

AirWatch by VMware is the leader in enterprise mobility management (EMM). We enable end users with a seamless digital workspace, and empower IT with a future-proof mobility platform that provides fl exibility to manage multiple use cases, unifi ed management of endpoints, end-to-end security, and seamless integration across enterprise systems.

www.air-watch.com

Darktrace is a fast-growing cyber threat defense company and world leader in Enterprise Immune System technology. Darktrace’s award-winning solution is powered by machine learning and mathematics developed at the University of Cambridge, and helping organizations defend against advanced cyber-attacks and insider threat by detecting previously-unidentifi ed anomalies in real time.

www.darktrace.com

Qualys (www.qualys.com) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance, delivering critical security intelligence on demand.

www.qualys.com

Fortinet is a worldwide provider of network security appliances and a market leader in Network Security. Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100.

www.fortinet.com

Splunk Inc. provides the leading platform for Operational Intelligence. Splunk® software searches, monitors, analyzes and visualizes machine-generated big data from websites, applications, servers, networks, sensors and mobile devices. More than 8,400 organizations use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, improve service performance and reduce costs.

www.splunk.com

Visit gartner.com/eu/security for more information

Silver Sponsors

Avecto is an innovative technology business specializing in endpoint security. The company’s revolutionary Defendpoint software ensures defense in depth while empowering users to work freely.

www.avecto.com

BlackBerry provides an end-to-end suite of secure mobile solutions, delivering innovative mobile technologies to users and organizations that value productivity and achievement. Learn more: www.BlackBerry.com.

www.blackberry.com

For 30 years, Boldon James has been a leader in data classifi cation solutions, helping organisations manage sensitive information securely & in compliance with legislation and standards.

www.boldonjames.com

Certes protects data in motion. Our CryptoFlow™ Solutions safeguard sensitive applications over any network with user-aware policies that protect data when fi rewalls can’t stop hackers.

certesnetworks.com

CSG Invotas is an award-winning leader in security orchestration and automation for global security operations, delivering an automated threat response solution to unify, orchestrate and automate key elements of incident response.

www.csginvotas.com

DenyAll is a European software vendor, an expert in next generation application security, building on 15 years of experience securing web applications and services.

www.denyall.com

Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and customers with Okta.

www.okta.com

Pirean are recognised leaders in Identity and Access management solutions, delivering industry best practice and expertise through a unique Software, Consulting and Support Services blend.

http://pirean.com

RedSocks is a Dutch IT security company specialising in detecting and defeating malware in the corporate market. RedSocks supplies the RedSocks Malware Threat Defender (MTD) as a network appliance.

www.redsocks.nl

eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats.

www.esentire.com

Imperva® is a leading provider of security solutions that protect business-critical data and applications. The company’s products enable organizations to discover vulnerabilities, protect information, and comply with regulations.

www.imperva.com

LogRhythm, a leader in security intelligence and analytics, empowers companies to rapidly detect, respond to and neutralize damaging cyber threats.

www.logrhythm.com

As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks.

www.ssh.com

Vectra Networks’ X-series detection platform continuously monitors traffi c to automatically detect cyber attacks, prioritizing them by greatest risk and enabling organizations to focus resources.

www.vectranetworks.com

Voltage Security provides end-to-end, data-centric encryption, tokenization and key management solutions that allows companies to seamlessly secure all types of sensitive information wherever it resides.

www.voltage.com

MetricStream is the market leader for integrated Governance, Risk, and Compliance (GRC) Management Solutions that enable organizations to deliver better business performance.

www.metricstream.com

Netskope™ is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across cloud apps so businesses can move fast, with confi dence.

www.netskope.com

ObserveIT, a pioneer in User Activity Monitoring, provides video recordings of user activity, analytics and alerting to address user- based attacks. Over 1,200 companies use ObserveIT. Visithttp://www.observeit.com for more information.

www.observeit.com

Secure Mobile Gateway pioneer. Mobile threat prevention and data usage optimization with real-time analytics. On device and in the cloud. Gartner Cool Vendor.

www.wandera.com

WatchGuard® Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools.

www.watchguard.com

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior.

www.wombatsecurity.com

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data.

www.tenable.com

Sponsors correct as of 12 June 2015

Our analysts•Analyst-ledpresentations

•Analystone-on-oneprivatemeetings

•Analyst-facilitatedroundtables

Our research•100%independentandobjective

•Provenandreliable

•Relevanttoyourrole

Build a successful strategy•GetvalidationfromGartneranalysts

•Meetwithsupplierstosupportyourtacticalplanning

Expand your peer network•Innovateandproblem-solvewithlike-mindedpeers

•Jointhelargest,mostinfluentialnetworkofitskind

Grow in your role•Getcontentandsolutionsthataremostrelevanttoyou

•Leadmoreeffectively—anddevelopyourteam

WHY AttEnD A GARtnER EVEnt? WHAt MAKEs GARtnER EVEnts unIQuE?

©2015Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.oritsaffiliates.Formoreinformation,[email protected].

14 – 15 September | London, UK | gartner.com/eu/security

Gartner Security & Risk Management Summit 2015

Registration and pricing

Park Plaza Westminster Bridge200WestminsterBridgeRoadLondon,UKSE17UT

Phone+448444156780

www.parkplaza.com

GartnerHotelRoomRatePricesstartat£175pernightatParkPlazawhenusingpromotionalcodeGART130915

Venue

Money-backguarantee

If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee.

3easywaystoregisterWeb: gartner.com/eu/security

Email: [email protected]

Telephone: +442088792430

Pricing subject to change

early-bird price: €2,150 + UK VAT (offer ends 17 July 2015)

Standard price: €2,475 + UK VAT

public Sector price: €1,950 + UK VAT

Pricing

Gartner ClientsAGartnerticketcoversbothdaysoftheSummit.Contactyouraccountmanageroremailemea.events@gartner.comtoregisterusingaticket.

Group Rate discountMaximizelearningbyparticipatingtogetherinrelevantsessionsorsplittinguptocovermoretopics,sharingyoursessiontake-awayslater.

Complementary registrations:

• 1forevery3paidregistrations

• 2forevery5paidregistrations

• 3forevery7paidregistrations

Formoreinformation,[email protected].